Cyberattack News

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

For many businesses in 2018, Internet of Things technology will play a major part. A significant increase in spend and different technology types is predicted in a new report. However, does expansion bring more security concerns?

This year's big technology headlines have focused on cybersecurity and the range of businesses affected by cyberattacks. To help protect businesses in 2018, cybersecurity service firm Zenedge provides answers.

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Cybercriminals have combined three techniques into a single campaign, creating an attack that can steal credentials, phish credit cards and install bank Trojans. Based on an "increasingly sophisticated" form of malware, it targeted Austrian bank users.

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Deloitte has confirmed a data breach allowed attackers to steal confidential client emails. The incident went unnoticed for months and only became public knowledge after a Guardian report today. It was caused by a basic email security lapse.

The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.

Security researchers have discovered a flaw in Bluetooth that leaves almost every Bluetooth-enabled device vulnerable. It gives the attacker the ability to run malicious code. It's an example of what could go wrong with the Internet of Things.

The transition of more and more health information into a digital format can lead to many benefits, especially in terms of the speed of analysis. It can also present risks, in terms of cybersecurity. Risks are highlighted in a new report.

The threat from the destructive piece of ransomware, dubbed WannaCry, has dissipated, but this doesn’t mean businesses are no longer vulnerable to attack. We take stock of the best advice for businesses.

The CIA has developed strains of malware specifically designed to target Linux computers. The existence of the malware, known as OutlawCountry, was revealed by WikiLeaks. It demonstrates the CIA is intent on accessing all kinds of computer system.

San Francisco -
A global wave of cyberattacks exploited an already patched vulnerability in Windows software and appeared to have Ukraine as a primary target, according to computer security specialists.

HMS Queen Elizabeth, the UK's new £3.5 billion aircraft carrier, reportedly uses Windows XP as its computer operating system. The flagship vessel left the dockyard for the first time this week. It quickly sailed into fears of a potential cyberattack risk

We now live in a world where our very lives are tied into the technology we have created. From banking to defense systems, governments and medicine, every aspect of our lives are subject to software glitches and hacking, including pacemakers.

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

The WannaCry ransomware that made its way around the globe last week may have been aided by the use of pirated Windows versions. According to security researchers, the widespread use of illegal copies gave it a foothold in some regions.

Microsoft has criticised the US government following a massive ransomware cyberattack that hit computers around the world Friday, after it emerged that the malware made use of a software exploited developed by the NSA.

The UK's National Health Service (NHS) has been targeted by hackers in a major cyberattack this afternoon. According to unconfirmed reports, the perpetrators have control of NHS computers. The organisation is diverting emergency patients away from A&E.

Berlin -
NATO chief Jens Stoltenberg on Thursday said the alliance is coming under an increasing number of state-sponsored cyber attacks as he called on the bloc to boost its online defence capabilities.

Yahoo has said it believes "state-sponsored" actors were behind a massive data breach in 2013 that it only revealed today. The company said one billion user accounts could be affected. Customers have been advised to change all their passwords.

Hackers hijacked internet-connected smart home devices including security cameras, printers and digital video recorders to mount the "massive and sustained" cyberattack on the Internet's infrastructure last week. Scores of websites were made inaccessible.

A flaw in code used by essential components of the world's telecoms infrastructure could allow cybercriminals to gain complete control of mobile networks and millions of smartphones. The bug is present across the industry and will never be fully patched.